[info] Using makefile-style concurrent boot in runlevel 2. [ 48.754824][ T27] audit: type=1800 audit(1578044446.831:21): pid=7710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 48.797089][ T27] audit: type=1800 audit(1578044446.831:22): pid=7710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.19' (ECDSA) to the list of known hosts. 2020/01/03 09:40:58 fuzzer started 2020/01/03 09:41:00 dialing manager at 10.128.0.105:42817 2020/01/03 09:41:00 checking machine... 2020/01/03 09:41:00 checking revisions... 2020/01/03 09:41:00 testing simple program... syzkaller login: [ 62.385007][ T7884] IPVS: ftp: loaded support on port[0] = 21 2020/01/03 09:41:00 building call list... [ 62.744180][ T155] tipc: TX() has been purged, node left! executing program [ 65.633414][ T7867] can: request_module (can-proto-0) failed. [ 65.645115][ T7867] can: request_module (can-proto-0) failed. [ 65.656365][ T7867] can: request_module (can-proto-0) failed. 2020/01/03 09:41:04 syscalls: 2723 2020/01/03 09:41:04 code coverage: enabled 2020/01/03 09:41:04 comparison tracing: ioctl(KCOV_DISABLE) failed: invalid argument 2020/01/03 09:41:04 extra coverage: enabled 2020/01/03 09:41:04 setuid sandbox: enabled 2020/01/03 09:41:04 namespace sandbox: enabled 2020/01/03 09:41:04 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/03 09:41:04 fault injection: enabled 2020/01/03 09:41:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/03 09:41:04 net packet injection: enabled 2020/01/03 09:41:04 net device setup: enabled 2020/01/03 09:41:04 concurrency sanitizer: enabled 2020/01/03 09:41:04 devlink PCI setup: PCI device 0000:00:10.0 is not available 09:41:05 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 09:41:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x333, 0x0) [ 67.609526][ T7932] IPVS: ftp: loaded support on port[0] = 21 [ 67.743718][ T7932] chnl_net:caif_netlink_parms(): no params data found [ 67.774969][ T7932] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.782064][ T7932] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.789894][ T7932] device bridge_slave_0 entered promiscuous mode [ 67.797480][ T7932] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.800780][ T7935] IPVS: ftp: loaded support on port[0] = 21 [ 67.804959][ T7932] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.818197][ T7932] device bridge_slave_1 entered promiscuous mode 09:41:05 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x148110, r0, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000140)={0xf, 0x1f, 0x2}, 0xf) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f00000003c0)) socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x6000) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) [ 67.838719][ T7932] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.850443][ T7932] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.874368][ T7932] team0: Port device team_slave_0 added [ 67.881086][ T7932] team0: Port device team_slave_1 added [ 67.966703][ T7932] device hsr_slave_0 entered promiscuous mode [ 68.014448][ T7932] device hsr_slave_1 entered promiscuous mode [ 68.080597][ T7937] IPVS: ftp: loaded support on port[0] = 21 09:41:06 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000600)='./bus\x00', 0x40042, 0x0) read$FUSE(r0, &(0x7f0000000640), 0x10000011b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xffb7) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() setreuid(0x0, 0x0) getpid() syz_open_dev$dmmidi(0x0, 0x0, 0x802) timer_create(0x9, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f0000000200)="d40eb510f424f0c72168b9b6a757ef9142e20b601c5742bc45ba7d0ce214d7ae7d46bef713e166e1627af3b86011a495ee2b4ce86e377881339b1cfb96058763084dc29b415553ee7077b899220626043b170a2a1c103bb973cc4473e8393d8421d7e948a92e8df6d0310e647fdac385900d01d5a5da527436c7ca0be802230d60f0f15d31a3ae8c6659785fbb70ef0d96793db4fef3b09fe2b39bbfcb118c8df4b7ba42c338726d0b7309c8586ab43dbdac69b504d7ec74274b66e851cc", 0xbe}) fstat(0xffffffffffffffff, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) setreuid(0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x840fc0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000009f9c)=""/100, 0x64) [ 68.136033][ T7932] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.176836][ T7932] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.238463][ T7932] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.296880][ T7935] chnl_net:caif_netlink_parms(): no params data found [ 68.324169][ T7932] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.335205][ T7940] IPVS: ftp: loaded support on port[0] = 21 09:41:06 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f00000001c0)=ANY=[@ANYPTR], 0x8) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r0) [ 68.412613][ T7932] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.419716][ T7932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.427037][ T7932] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.434119][ T7932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.512798][ T7935] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.525415][ T7935] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.544987][ T7935] device bridge_slave_0 entered promiscuous mode [ 68.566327][ T7935] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.573383][ T7935] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.592475][ T7935] device bridge_slave_1 entered promiscuous mode [ 68.646831][ T7935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.665820][ T7935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:41:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 68.704851][ T7935] team0: Port device team_slave_0 added [ 68.719126][ T7937] chnl_net:caif_netlink_parms(): no params data found [ 68.728615][ T7935] team0: Port device team_slave_1 added [ 68.769818][ T7942] IPVS: ftp: loaded support on port[0] = 21 [ 68.856099][ T7935] device hsr_slave_0 entered promiscuous mode [ 68.924304][ T7935] device hsr_slave_1 entered promiscuous mode [ 68.974432][ T7935] debugfs: Directory 'hsr0' with parent '/' already present! [ 68.982225][ T3597] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.990092][ T3597] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.016475][ T7940] chnl_net:caif_netlink_parms(): no params data found [ 69.042975][ T7932] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.062464][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.064959][ T7947] IPVS: ftp: loaded support on port[0] = 21 [ 69.070991][ T7937] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.083097][ T7937] device bridge_slave_0 entered promiscuous mode [ 69.092232][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.099364][ T7937] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.107121][ T7937] device bridge_slave_1 entered promiscuous mode [ 69.124861][ T7937] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.152931][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.160185][ T7940] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.168078][ T7940] device bridge_slave_0 entered promiscuous mode [ 69.176609][ T7937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.201120][ T7937] team0: Port device team_slave_0 added [ 69.208434][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.215752][ T7940] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.223670][ T7940] device bridge_slave_1 entered promiscuous mode [ 69.231349][ T7937] team0: Port device team_slave_1 added [ 69.237841][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.245926][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.272078][ T7932] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.289085][ T7935] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 69.347531][ T7940] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.406532][ T7937] device hsr_slave_0 entered promiscuous mode [ 69.454391][ T7937] device hsr_slave_1 entered promiscuous mode [ 69.534279][ T7937] debugfs: Directory 'hsr0' with parent '/' already present! [ 69.541798][ T7935] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 69.608043][ T7935] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 69.657075][ T7940] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.677724][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.686472][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.695109][ T7948] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.702194][ T7948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.712741][ T7935] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 69.785951][ T7940] team0: Port device team_slave_0 added [ 69.806591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.815556][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.823991][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.831040][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.838994][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.861975][ T7940] team0: Port device team_slave_1 added [ 69.885693][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.894673][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.903228][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.912633][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.920920][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.929703][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.016005][ T7940] device hsr_slave_0 entered promiscuous mode [ 70.064747][ T7940] device hsr_slave_1 entered promiscuous mode [ 70.104192][ T7940] debugfs: Directory 'hsr0' with parent '/' already present! [ 70.117382][ T7942] chnl_net:caif_netlink_parms(): no params data found [ 70.134051][ T7937] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 70.176257][ T7946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.186303][ T7946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.199550][ T7932] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.211269][ T7932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.241587][ T7937] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 70.296504][ T7946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.305523][ T7946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.335841][ T7947] chnl_net:caif_netlink_parms(): no params data found [ 70.356523][ T7937] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 70.407201][ T7937] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 70.454322][ T7940] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 70.507573][ T7940] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 70.557697][ T7940] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 70.596630][ T7940] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 70.665577][ T7932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.690693][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 70.698474][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 70.716900][ T7942] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.723967][ T7942] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.731748][ T7942] device bridge_slave_0 entered promiscuous mode [ 70.739092][ T7947] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.746607][ T7947] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.754222][ T7947] device bridge_slave_0 entered promiscuous mode [ 70.761415][ T7947] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.768620][ T7947] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.776280][ T7947] device bridge_slave_1 entered promiscuous mode [ 70.789885][ T7942] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.797092][ T7942] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.807022][ T7942] device bridge_slave_1 entered promiscuous mode [ 70.822916][ T7935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.871320][ T7947] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.912829][ T7935] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.923295][ T7937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.931886][ T7942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.942298][ T7947] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.956520][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.964638][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.988492][ T7942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.008709][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.018184][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.029693][ T3087] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.036753][ T3087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.055267][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 09:41:09 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 71.065793][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.074582][ T3087] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.081654][ T3087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.097421][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.106625][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.117341][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.128561][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.138620][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.150119][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.160405][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.170504][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.183640][ T7937] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.200490][ T7935] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 09:41:09 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 71.216369][ T7935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.228919][ T7947] team0: Port device team_slave_0 added [ 71.239180][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.250559][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.259838][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.270861][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.279754][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.291648][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.302914][ T26] ================================================================== [ 71.307835][ T7942] team0: Port device team_slave_0 added [ 71.311031][ T26] BUG: KCSAN: data-race in find_next_bit / rcu_report_exp_cpu_mult [ 71.324408][ T26] [ 71.326744][ T26] write to 0xffffffff85c7d140 of 8 bytes by interrupt on cpu 0: [ 71.328802][ T7942] team0: Port device team_slave_1 added [ 71.334381][ T26] rcu_report_exp_cpu_mult+0x4f/0xa0 [ 71.334396][ T26] rcu_report_exp_rdp+0x6c/0x90 [ 71.334412][ T26] rcu_exp_handler+0xe5/0x190 [ 71.334428][ T26] flush_smp_call_function_queue+0x18c/0x2b0 [ 71.334453][ T26] generic_smp_call_function_single_interrupt+0x1c/0x49 [ 71.367635][ T26] smp_call_function_single_interrupt+0x3f/0x100 [ 71.373941][ T26] call_function_single_interrupt+0xf/0x20 [ 71.379731][ T26] __read_once_size.constprop.0+0x16/0x20 [ 71.385522][ T26] notifier_call_chain+0xb4/0x160 [ 71.390528][ T26] raw_notifier_call_chain+0x37/0x50 [ 71.395796][ T26] call_netdevice_notifiers_info+0x9a/0x120 [ 71.401678][ T26] register_netdevice+0x8a3/0xad0 [ 71.406685][ T26] veth_newlink+0x2c6/0x6b0 [ 71.411181][ T26] __rtnl_newlink+0xc8d/0x1090 [ 71.416019][ T26] rtnl_newlink+0x63/0x90 [ 71.420327][ T26] rtnetlink_rcv_msg+0x1d3/0x500 [ 71.425253][ T26] netlink_rcv_skb+0xb0/0x260 [ 71.429921][ T26] rtnetlink_rcv+0x26/0x30 [ 71.434461][ T26] netlink_unicast+0x3a6/0x4d0 [ 71.439220][ T26] netlink_sendmsg+0x4d3/0x8b0 [ 71.443975][ T26] sock_sendmsg+0x9f/0xc0 [ 71.448286][ T26] __sys_sendto+0x21f/0x320 [ 71.452824][ T26] __x64_sys_sendto+0x89/0xb0 [ 71.457491][ T26] do_syscall_64+0xcc/0x3a0 [ 71.461986][ T26] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.467867][ T26] [ 71.470181][ T26] read to 0xffffffff85c7d140 of 8 bytes by task 26 on cpu 1: [ 71.477530][ T26] find_next_bit+0x57/0xe0 [ 71.481933][ T26] sync_rcu_exp_select_node_cpus+0x28e/0x510 [ 71.488373][ T26] sync_rcu_exp_select_cpus+0x30c/0x590 [ 71.493918][ T26] wait_rcu_exp_gp+0x25/0x40 [ 71.498491][ T26] process_one_work+0x3d4/0x890 [ 71.503326][ T26] worker_thread+0xa0/0x800 [ 71.507907][ T26] kthread+0x1d4/0x200 [ 71.511966][ T26] ret_from_fork+0x1f/0x30 [ 71.516356][ T26] [ 71.518663][ T26] Reported by Kernel Concurrency Sanitizer on: [ 71.524798][ T26] CPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 5.5.0-rc1-syzkaller #0 [ 71.532922][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.542964][ T26] Workqueue: rcu_gp wait_rcu_exp_gp [ 71.548141][ T26] ================================================================== [ 71.556197][ T26] Kernel panic - not syncing: panic_on_warn set ... [ 71.562764][ T26] CPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 5.5.0-rc1-syzkaller #0 [ 71.570891][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.580936][ T26] Workqueue: rcu_gp wait_rcu_exp_gp [ 71.586123][ T26] Call Trace: [ 71.589410][ T26] dump_stack+0x11d/0x181 [ 71.593738][ T26] panic+0x210/0x640 [ 71.597618][ T26] ? vprintk_func+0x8d/0x140 [ 71.602191][ T26] kcsan_report.cold+0xc/0xd [ 71.606768][ T26] kcsan_setup_watchpoint+0x3fe/0x460 [ 71.612131][ T26] __tsan_read8+0xc6/0x100 [ 71.616540][ T26] find_next_bit+0x57/0xe0 [ 71.620941][ T26] sync_rcu_exp_select_node_cpus+0x28e/0x510 [ 71.626917][ T26] sync_rcu_exp_select_cpus+0x30c/0x590 [ 71.632461][ T26] wait_rcu_exp_gp+0x25/0x40 [ 71.637049][ T26] process_one_work+0x3d4/0x890 [ 71.641886][ T26] worker_thread+0xa0/0x800 [ 71.646389][ T26] kthread+0x1d4/0x200 [ 71.650451][ T26] ? rescuer_thread+0x6a0/0x6a0 [ 71.655304][ T26] ? kthread_unpark+0xe0/0xe0 [ 71.659993][ T26] ret_from_fork+0x1f/0x30 [ 71.665752][ T26] Kernel Offset: disabled [ 71.670088][ T26] Rebooting in 86400 seconds..